Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing Embedded Systems with PIC Microcontrollers, Second Edition: Principles and Applications
Designing Embedded Systems with PIC Microcontrollers, Second Edition: Principles and Applications

PIC microcontrollers are used worldwide in commercial and industrial devices. The 8-bit PIC which this book focuses on is a versatile work horse that completes many designs. An engineer working with applications that include a microcontroller will no doubt come across the PIC sooner rather than later. It is a must to have a working knowledge...

Jenkins: The Definitive Guide
Jenkins: The Definitive Guide

This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can...

Word Sense Disambiguation: Algorithms and Applications (Text, Speech and Language Technology)
Word Sense Disambiguation: Algorithms and Applications (Text, Speech and Language Technology)

Word sense disambiguation is a core research problem in computational linguistics, which was recognized at the beginning of the scientific interest in machine translation and artificial intelligence. And yet no book has been fully devoted to review the wide variety of approaches to solving the problem. The time is right for such a...

Pro Java 7 NIO.2 (Professional Apress)
Pro Java 7 NIO.2 (Professional Apress)

The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O

APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities of this
...
Running Lean: Iterate from Plan A to a Plan That Works (Lean Series)
Running Lean: Iterate from Plan A to a Plan That Works (Lean Series)
We live in an age of unparalleled opportunity for innovation. We're building more products than ever before, but most of them fail--not because we can't complete what we set out to build, but because we waste time, money, and effort building the wrong product.
What we need is a systematic process for quickly vetting product
...
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)
The Career Programmer: Guerilla Tactics for an Imperfect World (Expert's Voice)

The crucial wisdom-guide to surviving within the programming industry in 2006. Provides raw material for surviving and thinking smart in today's industry. Delivered with the wit and aplomb to make a serious topic entertaining and palatable

TE Conquer Master self-defense techniques to shield yourself, your project,...

Exploring SE for Android
Exploring SE for Android

Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

About This Book

  • Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
  • Build and enable current security enhancements from the SE for Android project...
Inside XML
Inside XML

The XML explosion hardly needs any introduction. It's everywhere and there just seems to be no end to what can be done with XML. While writing to the W3C standards, and keeping up with the pace for corporate implementation, you, the programmer or web developer, will need a comprehensive guide to get you started and show you...

Software Development: Building Reliable Systems
Software Development: Building Reliable Systems

80% of software projects fail -- here’s why the other 20% succeed!

Software Development is the most thorough, realistic guide to "what works" in software development - and how to make it happen in your organization. Leading consultant Marc Hamilton tackles all three key components of...

The Next Wave in Computing, Optimization, and Decision Technologies
The Next Wave in Computing, Optimization, and Decision Technologies
Brown et al. (2004) (see also Reed 1994 and Skroch 2004) model the
completion of an adversarial nation’s nuclear-weapons program using
general techniques of PERT. (See PERT 1958 and Malcolm et al. 1959
for the original descriptions of PERT, and see Moder et al. 1983 for a
comprehensive review.) Brown et al. (2004) ask the
...
CSS Cookbook, 2nd Edition
CSS Cookbook, 2nd Edition

As the industry standard method for enriching the presentation of HTML-based web pages, Cascading Style Sheets (CSS) allow you to give web pages more structure and a more sophisticated look. But first, you have to get past CSS theory and resolve real-world problems.

For those all-too-common dilemmas that...

The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services
The IMS: IP Multimedia Concepts and Services, Second Editionbuilds on the success of the previous best-selling edition, providing comprehensive coverage of IMS – its concepts, architecture, protocols and functionalities with a wealth of new and updated material. Mobile telephony with the current technology has been hugely...
unlimited object storage image
Result Page: 343 342 341 340 339 338 337 336 335 334 333 332 331 330 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy